Effective Approaches for Intrusion Detection Systems in the Face of Low-Frequency Attacks

被引:1
|
作者
El Asry, Chadia [1 ]
Benchaji, Ibtissam [1 ]
Douzi, Samira [2 ]
El Ouahidi, Bouabid [1 ]
机构
[1] Mohammed V Univ, Fac Sci, Intelligent Proc & Secur Syst IPSS, Rabat, Morocco
[2] Mohammed V Univ Rabat, Fac Med & Pharm FMPR, Rabat, Morocco
关键词
Intrusion detection systems; deep learning; SHapley Additive exPlanations (SHAP) values; Long-Short- Term-Memory (LSTM); feature selection;
D O I
10.12720/jait.15.9.1070-1078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach to improve the detection of network security by combining feature selection with Long-Short-Term-Memory (LSTM) approaches. The SHapley Additive exPlanations (SHAP) values approach is utilized for feature selection, in conjunction with cross-validation, to identify the most effective set of features that improve model recall for each specific sort of assault. We employ the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset to train and assess the efficacy of our model. The suggested model exhibits greater performance in comparison to standard LSTM models when utilizing all features. Furthermore, it surpasses current leading models with an accuracy of 99.74%, precision of 95.42%, recall of 94.92%, and F1-Score of 94.90%. In addition, the model demonstrates outstanding aptitude in precisely detecting Remote-to-Local (R2L) and User-to-Root (U2R) attacks, which are complex forms of intrusions that exploit vulnerabilities to gain unauthorized access to systems or networks. Although infrequent, these assaults provide a substantial risk because they have the ability to do substantial harm and compromise confidential data.
引用
收藏
页码:1070 / 1078
页数:9
相关论文
共 50 条
  • [1] An Effective Intrusion Detection Approach for Jamming Attacks on RFID Systems
    Avanco, Leandro
    Guelfi, A. E.
    Pontes, Elvis
    Silva, A. A. A.
    Kofuji, S. T.
    Zhou, F.
    2015 INTERNATIONAL EURASIP WORKSHOP ON RFID TECHNOLOGY (EURFID), 2015, : 73 - 80
  • [2] A Membership Function Detection of Low for Intrusion and Anomaly Frequency Attacks
    Nagaraja, Arun
    Kiran, V. Sravan
    Prabhakara, H. S.
    Rajasekhar, N.
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE, E-LEARNING AND INFORMATION SYSTEMS 2018 (DATA'18), 2018,
  • [3] Selection of Effective Network Parameters in Attacks for Intrusion Detection
    Zargar, Gholam Reza
    Kabiri, Peyman
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2010, 6171 : 643 - +
  • [4] A Survey on Network Attacks and Intrusion Detection Systems
    Latha, S.
    Prakash, Sinthu Janita
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [5] Influence of DoS Attacks on Intrusion Detection Systems
    Titorenko, Aleksey A.
    Goncharov, Dmitry E.
    PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 144 - 146
  • [6] Automatic Clustering of Attacks in Intrusion Detection Systems
    Shojafar, Mohammad
    Taheri, Rahim
    Pooranian, Zahra
    Javidan, Reza
    Miri, Ali
    Jararweh, Yaser
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [7] Low-Frequency Representation for Face Recognition
    Wang, Bangjun
    Zhang, Li
    Li, Fanzhang
    NEURAL INFORMATION PROCESSING (ICONIP 2017), PT VI, 2017, 10639 : 510 - 519
  • [8] Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things
    Li, Xinghua
    Xu, Mengfan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Liu, Ximeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8820 - 8831
  • [9] Detection of data integrity attacks by constructing an effective intrusion detection system
    R. B. Benisha
    S. Raja Ratna
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5233 - 5244
  • [10] Detection of data integrity attacks by constructing an effective intrusion detection system
    Benisha, R. B.
    Ratna, S. Raja
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5233 - 5244